/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/functional/ |
D | WifiAssociationTest.java | 64 String password = arguments.getString("password"); in testWifiAssociation() local 76 WifiConfiguration config = getConfig(ssid, securityType, password); in testWifiAssociation() 107 private WifiConfiguration getConfig(String ssid, SecurityType securityType, String password) { in getConfig() argument 116 assertNotNull("password is empty", password); in getConfig() 118 assertTrue(WifiConfigurationHelper.isHex(password, 10)); in getConfig() 119 config = WifiConfigurationHelper.createWepConfig(ssid, password); in getConfig() 123 assertNotNull("password is empty", password); in getConfig() 125 assertTrue(WifiConfigurationHelper.isHex(password, 26)); in getConfig() 126 config = WifiConfigurationHelper.createWepConfig(ssid, password); in getConfig() 130 assertNotNull("password is empty", password); in getConfig() [all …]
|
/frameworks/base/core/tests/ConnectivityManagerTest/src/com/android/connectivitymanagertest/ |
D | WifiConfigurationHelper.java | 71 public static WifiConfiguration createWepConfig(String ssid, String password) { in createWepConfig() argument 74 if (isHex(password, 10) || isHex(password, 26) || isHex(password, 58)) { in createWepConfig() 75 config.wepKeys[0] = password; in createWepConfig() 77 config.wepKeys[0] = quotedString(password); in createWepConfig() 93 public static WifiConfiguration createPskConfig(String ssid, String password) { in createPskConfig() argument 96 if (isHex(password, 64)) { in createPskConfig() 97 config.preSharedKey = password; in createPskConfig() 99 config.preSharedKey = quotedString(password); in createPskConfig() 118 public static WifiConfiguration createEapConfig(String ssid, String password, int eapMethod, in createEapConfig() argument 134 config.enterpriseConfig.setPassword(password); in createEapConfig() [all …]
|
D | ConnectivityManagerTestRunner.java | 62 String password = (String) icicle.get("password"); in onCreate() local 63 if (password != null) { in onCreate() 64 mPassword = password; in onCreate()
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/dataconnection/ |
D | DataProfile.java | 41 public final String password; field in DataProfile 57 String user, String password, int type, int maxConnsTime, int maxConns, in DataProfile() argument 65 this.password = password; in DataProfile() 75 apn.authType, apn.user, apn.password, apn.bearerBitmask == 0 in DataProfile() 94 pc.writeString(dps[i].password); in toParcel() 107 + "/" + user + "/" + password + "/" + type + "/" + maxConnsTime in toString()
|
/frameworks/base/obex/javax/obex/ |
D | PasswordAuthentication.java | 53 public PasswordAuthentication(final byte[] userName, final byte[] password) { in PasswordAuthentication() argument 59 mPassword = new byte[password.length]; in PasswordAuthentication() 60 System.arraycopy(password, 0, mPassword, 0, password.length); in PasswordAuthentication()
|
D | ObexSession.java | 144 byte[] password = result.getPassword(); in handleAuthChall() 145 if (password == null) { in handleAuthChall() 169 byte[] digest = new byte[challenge.length + password.length + 1]; in handleAuthChall() 173 System.arraycopy(password, 0, digest, challenge.length + 1, password.length); in handleAuthChall()
|
/frameworks/base/docs/html/guide/topics/admin/ |
D | device-admin.jd | 41 enforce password policies — including alphanumeric passwords or numeric 95 password that violates the guidelines), it is up to the application to decide 129 <td>Minimum password length</td> 130 <td>Set the required number of characters for the password. For example, you 133 <td>Alphanumeric password required</td> 140 <td>Complex password required</td> 146 <td>Minimum letters required in password</td> <td>The minimum number of 147 letters required in the password for all admins or a particular one. Introduced in Android 3.0.</td… 152 <td>Minimum lowercase letters required in password</td> 154 letters required in the password for all admins or a particular one. Introduced in Android 3.0.</td… [all …]
|
/frameworks/base/core/java/com/android/internal/widget/ |
D | LockPatternChecker.java | 121 final String password, in verifyPassword() argument 131 return utils.verifyPassword(password, challenge, userId); in verifyPassword() 157 final String password, in verifyTiedProfileChallenge() argument 168 return utils.verifyTiedProfileChallenge(password, isPattern, challenge, userId); in verifyTiedProfileChallenge() 193 final String password, in checkPassword() argument 202 return utils.checkPassword(password, userId); in checkPassword()
|
D | LockPatternUtils.java | 370 public byte[] verifyPassword(String password, long challenge, int userId) in verifyPassword() argument 375 getLockSettings().verifyPassword(password, challenge, userId); in verifyPassword() 399 public byte[] verifyTiedProfileChallenge(String password, boolean isPattern, long challenge, in verifyTiedProfileChallenge() argument 404 getLockSettings().verifyTiedProfileChallenge(password, isPattern, challenge, in verifyTiedProfileChallenge() 425 public boolean checkPassword(String password, int userId) throws RequestThrottledException { in checkPassword() argument 429 getLockSettings().checkPassword(password, userId); in checkPassword() 462 public boolean checkPasswordHistory(String password, int userId) { in checkPasswordHistory() argument 464 passwordToHash(password, userId), StandardCharsets.UTF_8); in checkPasswordHistory() 708 static public int computePasswordQuality(String password) { in computePasswordQuality() argument 711 final int len = password.length(); in computePasswordQuality() [all …]
|
D | ILockSettings.aidl | 34 void setLockPassword(in String password, in String savedPassword, int userId); in setLockPassword() argument 35 VerifyCredentialResponse checkPassword(in String password, int userId); in checkPassword() argument 36 VerifyCredentialResponse verifyPassword(in String password, long challenge, int userId); in verifyPassword() argument 37 …VerifyCredentialResponse verifyTiedProfileChallenge(String password, boolean isPattern, long chall… in verifyTiedProfileChallenge() argument
|
/frameworks/base/docs/html/work/ |
D | device-management-policy.jd | 41 such that it ensures a screen-lock password of sufficient strength is set up before displaying 48 cover screen-lock password strength, expiration timeout, encryption, etc.</p> 55 android.app.admin.DevicePolicyManager} (defining minimum password length and minimum number of 63 <p>The following snippet declares the limit password policy in <code>res/xml/device_admin.xml</code… 68 <limit-password /> 105 // Deletes previously stored password policy. 183 to the actual screen-lock password used, through the Device Policy Manager API it can determine 184 whether the existing password satisfies the required policy. If it turns out that the existing 185 screen-lock password is not sufficient, the device administration API does not automatically take 187 password-change screen in the Settings app. For example:</p> [all …]
|
/frameworks/base/services/core/java/com/android/server/ |
D | LockSettingsService.java | 719 private void setKeystorePassword(String password, int userHandle) { in setKeystorePassword() argument 721 ks.onUserPasswordChanged(userHandle, password); in setKeystorePassword() 724 private void unlockKeystore(String password, int userHandle) { in unlockKeystore() argument 727 ks.unlock(userHandle, password); in unlockKeystore() 959 public void setLockPassword(String password, String savedCredential, int userId) in setLockPassword() argument 963 setLockPasswordInternal(password, savedCredential, userId); in setLockPassword() 968 private void setLockPasswordInternal(String password, String savedCredential, int userId) in setLockPasswordInternal() argument 971 if (password == null) { in setLockPasswordInternal() 1002 byte[] enrolledHandle = enrollCredential(currentHandle, savedCredential, password, userId); in setLockPasswordInternal() 1006 setUserKeyProtection(userId, password, in setLockPasswordInternal() [all …]
|
/frameworks/base/core/java/com/android/internal/net/ |
D | VpnProfile.java | 54 public String password = ""; // 4 field in VpnProfile 79 password = in.readString(); in VpnProfile() 100 out.writeString(password); in writeToParcel() 134 profile.password = values[4]; in decode() 146 profile.saveLogin = !profile.username.isEmpty() || !profile.password.isEmpty(); in decode() 159 builder.append('\0').append(saveLogin ? password : ""); in encode()
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/pps/ |
D | Credential.java | 39 EAPMethod eapMethod, String userName, String password, in Credential() argument 48 if (!TextUtils.isEmpty(password)) { in Credential() 49 byte[] pwOctets = Base64.decode(password, Base64.DEFAULT); in Credential() 106 public Credential(Credential other, String password) { in Credential() argument 112 mPassword = password; in Credential()
|
/frameworks/base/packages/Osu/src/com/android/hotspot2/utils/ |
D | HTTPRequest.java | 61 public void doAuthenticate(HTTPResponse httpResponse, String userName, byte[] password, in doAuthenticate() argument 64 generateAuthAnswer(httpResponse, userName, password, url, sequence)); in doAuthenticate() 68 byte[] password, URL url, int sequence) in generateAuthAnswer() argument 131 String passwordString = new String(password, StandardCharsets.UTF_8); in generateAuthAnswer() 283 private static void test(String user, String realm, String password, String method, String path, in test() argument 286 byte[] a1 = hash(user, realm, password); in test()
|
/frameworks/opt/telephony/tests/telephonytests/src/com/android/internal/telephony/dataconnection/ |
D | DataProfileTest.java | 90 assertEquals(mApn1.password, dp.password); in testCreateFromApnSetting() 115 assertEquals("i = " + i, mApn1.password, p.readString()); in testParcel()
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/ |
D | IccCard.java | 152 String password, Message onComplete); in setIccLockEnabled() argument 166 String password, Message onComplete); in setIccFdnEnabled() argument
|
/frameworks/opt/net/wifi/service/java/com/android/server/wifi/hotspot2/pps/ |
D | Credential.java | 48 EAPMethod eapMethod, String userName, String password, in Credential() argument 57 if (!TextUtils.isEmpty(password)) { in Credential() 58 byte[] pwOctets = Base64.decode(password, Base64.DEFAULT); in Credential() 115 public Credential(Credential other, String password) { in Credential() argument 121 mPassword = password; in Credential()
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/sip/ |
D | SipCommandInterface.java | 260 String apn, String user, String password, int authType, in setupDataCall() argument 353 public void queryFacilityLock(String facility, String password, in queryFacilityLock() argument 358 public void queryFacilityLockForApp(String facility, String password, in queryFacilityLockForApp() argument 364 String password, int serviceClass, Message response) { in setFacilityLock() argument 369 String password, int serviceClass, String appId, Message response) { in setFacilityLockForApp() argument 565 String password, Message result) { in setInitialAttachApn() argument
|
/frameworks/opt/telephony/src/java/com/android/internal/telephony/imsphone/ |
D | ImsPhoneCommandInterface.java | 259 String apn, String user, String password, int authType, in setupDataCall() argument 352 public void queryFacilityLock(String facility, String password, in queryFacilityLock() argument 357 public void queryFacilityLockForApp(String facility, String password, in queryFacilityLockForApp() argument 363 String password, int serviceClass, Message response) { in setFacilityLock() argument 368 String password, int serviceClass, String appId, Message response) { in setFacilityLockForApp() argument 564 String password, Message result) { in setInitialAttachApn() argument
|
/frameworks/base/tests/LegacyRestoreTest/ |
D | README | 4 to the PBKDF2 implementation. The archive's encryption password, entered on-screen, 9 reporting an invalid password in logcat. This is the situation reported in bug
|
/frameworks/base/tools/layoutlib/bridge/src/android/webkit/ |
D | WebView.java | 82 public void savePassword(String host, String username, String password) { in savePassword() argument 86 String username, String password) { in setHttpAuthUsernamePassword() argument
|
/frameworks/base/include/storage/ |
D | IMountService.h | 72 virtual int32_t decryptStorage(const String16& password) = 0; 73 virtual int32_t encryptStorage(const String16& password) = 0;
|
/frameworks/base/core/java/org/apache/http/conn/ssl/ |
D | SSLSocketFactory.java | 255 private static KeyManager[] createKeyManagers(final KeyStore keystore, final String password) in createKeyManagers() argument 262 kmfactory.init(keystore, password != null ? password.toCharArray(): null); in createKeyManagers()
|
/frameworks/opt/net/wifi/tests/wifitests/src/android/net/wifi/ |
D | WifiEnterpriseConfigTest.java | 261 String password = "supersecret"; in passwordNotInToString() local 262 mEnterpriseConfig.setPassword(password); in passwordNotInToString() 263 assertFalse(mEnterpriseConfig.toString().contains(password)); in passwordNotInToString()
|